IEEEXplore - A Self-adaptive Intrusion Detection Method for...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A Self-adaptive Intrusion Detection Method for AODV-based Mobile Ad Hoc Networks Satoshi Kurosawa † , Hidehisa Nakayama † , Nei Kato † , Abbas Jamalipour ‡ , and Yoshiaki Nemoto † † Graduate School of Information Sciences, Tohoku University Aoba 6–3–09, Aramaki, Aoba-ku, Sendai, Miyagi, 980–8579 Japan ‡ School of Electrical and Information Engineering, The University of Sydney, Sydney NSW 2006,Australia kuro@it.ecei.tohoku.ac.jp Abstract Mobile ad hoc networks (MANET) are usually formed without any major infrastructure. As a result, they are relatively vulnerable to malicious network at- tacks and therefore the security is a more significant issue than in infrastructure-type wireless networks. In these networks, it is difficult to identify malicious hosts, as the topology of the network changes dynamically. A malicious host can easily interrupt a route for which the malicious host is one of the forming nodes in the communication path. In the literature, there are sev- eral proposals to detect such malicious host inside the network. In those methods usually a baseline profile is defined in accordance to static training data and then they are used to verify the identity and the topol- ogy of the network, thus avoiding any malicious host to be joined in the network. Since the topology of a MANET is dynamically changing, use of a static pro- file is not efficient. In this paper, we propose a new intrusion detection scheme based on a learning process, so that the training data can be updated at particular time intervals. The simulation results show the effec- tiveness of the proposed technique compared to conven- tional schemes. 1 INTRODUCTION Mobile ad hoc networks (MANET) recently have re- ceived particular attention as part of next generation network technologies. These networks are usually con- structed using mobile and wireless host with minimum or no central control or point of attachment such as a base station. These networks could be useful in a variety of applications from a one-off meeting network, to disaster and military applications, and to the enter- tainment industry. Because in a MANET the network topology is changing frequently and there is no central manage- ment unit, all routing management are performed by individual nodes in a collaborative way. Consequently, there would be no authentication server that can use conventional cryptographic schemes to secure the net- work against attacks from malicious host. Typical types of attacks in MANET include: eavesdropping, spoofing, forged packets, denial of service (DoS), and so on. Secure routing protocol [1],[2] in which crypto- graphic technologies are applied have been suggested as a means for increasing the security in MANET. How- ever, these methods cannot protect the network from attacks of a harmful node who has acquired the net- work key. Therefore other security methods which can detect attacks from malicious hosts are required....
View Full Document

Page1 / 8

IEEEXplore - A Self-adaptive Intrusion Detection Method for...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online